Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/BushidoUK/Ransomware-Tool-Matrix
A resource containing all the tools each ransomware gangs uses
https://github.com/BushidoUK/Ransomware-Tool-Matrix
cti cybersecurity detection-engineering hacking osint ransomware threat-hunting threat-intelligence threatintel
Last synced: 3 days ago
JSON representation
A resource containing all the tools each ransomware gangs uses
- Host: GitHub
- URL: https://github.com/BushidoUK/Ransomware-Tool-Matrix
- Owner: BushidoUK
- Created: 2024-08-12T18:48:51.000Z (4 months ago)
- Default Branch: main
- Last Pushed: 2024-10-29T10:09:21.000Z (about 1 month ago)
- Last Synced: 2024-10-29T12:13:14.127Z (about 1 month ago)
- Topics: cti, cybersecurity, detection-engineering, hacking, osint, ransomware, threat-hunting, threat-intelligence, threatintel
- Homepage: https://blog.bushidotoken.net/2024/08/the-ransomware-tool-matrix.html
- Size: 593 KB
- Stars: 717
- Watchers: 21
- Forks: 75
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-lists - Tools used by ransomware groups - @BushidoToken
README
# Ransomware Tool Matrix
- This repository contains a list of which tools each ransomware gang or extortionist gang uses
- As defenders, we should exploit the fact that many of the tools used by these cybercriminals are often reused
- We can threat hunt, deploy detections, and block these tools to eliminate the ability of adversaries to launch intrusions
- This project will be updated as additional intelligence on ransomware gang TTPs is made available> [!TIP]
> This Ransomware Tool Matrix has several use cases, which are as follows:
> - As a list of leads for threat hunting inside the environments available to you
> - As a list of leads to look for during incident response engagements
> - As a checklist of tools to identify patterns of behaviour between certain ransomware affiliates
> - As an adversary emulation resource for threat intelligence-led purple team engagements## Ransomware Tool Matrix
- [RMM Tools](https://github.com/BushidoUK/Ransomware-Tool-Matrix/blob/main/Tools/RMM-Tools.md)
- [Exfiltration Tools](https://github.com/BushidoUK/Ransomware-Tool-Matrix/blob/main/Tools/Exfiltration.md)
- [Credential Theft Tools](https://github.com/BushidoUK/Ransomware-Tool-Matrix/blob/main/Tools/CredentialTheft.md)
- [Defense Evasion Tools](https://github.com/BushidoUK/Ransomware-Tool-Matrix/blob/main/Tools/DefenseEvasion.md)
- [Networking Tools](https://github.com/BushidoUK/Ransomware-Tool-Matrix/blob/main/Tools/Networking.md)
- [Discovery Tools](https://github.com/BushidoUK/Ransomware-Tool-Matrix/blob/main/Tools/DiscoveryEnum.md)
- [Offensive Security Tools](https://github.com/BushidoUK/Ransomware-Tool-Matrix/blob/main/Tools/Offsec.md)
- [Living-off-the-Land Binaries and Scripts](https://github.com/BushidoUK/Ransomware-Tool-Matrix/blob/main/Tools/LOLBAS.md)## Threat Intel Sources
- [List of CISA's Threat Groups](https://github.com/BushidoUK/Ransomware-Tool-Matrix/blob/main/ThreatIntel/CISAThreatGroups.md)
- [List of The DFIR Report's Threat Groups](https://github.com/BushidoUK/Ransomware-Tool-Matrix/blob/main/ThreatIntel/TheDFIRReportGroups.md)
- [List of Trend Micro's Threat Groups](https://github.com/BushidoUK/Ransomware-Tool-Matrix/blob/main/ThreatIntel/TrendMicroThreatGroups.md)
- [Common TTPs of the Modern Ransomware Groups by Kaspersky](https://go.kaspersky.com/rs/802-IJN-240/images/Common-TTPs-of-the-modern-ransomware_low-res.pdf)
- [The Conti Playbook](https://blog.talosintelligence.com/conti-leak-translation/)
- [The Bassterlord Networking Manual](https://ecirtam.net/autoblogs/autoblogs/wwwecirtamnetlinks_0241ee9d15822b0727e62c15c61de467d47742f3/media/eb33778a.2021-08-3120-20Bassterlord20FishEye20Networking20Manual20X.pdf)
- [Extra Threat Intel](https://github.com/BushidoUK/Ransomware-Tool-Matrix/blob/main/ThreatIntel/ExtraThreatIntel.md)## Additional Resources
- [List of Tools used by +10 Ransomware Gangs](https://github.com/BushidoUK/Ransomware-Tool-Matrix/blob/main/Tools/MostUsedTools.md)
- [List of Ransomware Group Profiles](https://github.com/BushidoUK/Ransomware-Tool-Matrix/tree/main/GroupProfiles)
- [List of All Tools by Type](https://github.com/BushidoUK/Ransomware-Tool-Matrix/blob/main/Tools/AllTools.csv)
- [Ransomware Tool Matrix Threat Hunt Checklist](https://github.com/BushidoUK/Ransomware-Tool-Matrix/blob/main/RTM_ThreatHunt_Checklist.csv)## Types of Ransomware Adversaries
> [!TIP]
> This repo also contains multiple types of Ransomware adversaries, this includes the ransomware gangs themselves, affiliates, and initial access brokers
> - **Rasnomware Gangs:** In this repo, a tool is associated with a ransomware gang, meaning that the tool was observed in an intrusion which resulted in the deployment of that ransomware family
> - **Affiliates:** A threat group in this repo with an asterisk at the end (e.g. Scattered Spider*), means it is a ransomware affiliate, which has access to one or more ransomware families
> - **Initial Access Brokers:** A threat group in this repo with an asterisk at the start (e.g. *Prophet Spider), means it is an Initial Access Broker (IAB), which sells access to one or more ransomware gangs
> - **State-sponsored:** A threat group in this repo with a plus sign at the end (e.g. DarkBit+), means it is a suspected state-sponosored adversary using ransomware, such as those from Iran, DPRK, Russia, or China## Challenges
> [!IMPORTANT]
> Using the Ransomware Tool Matrix comes with its own challenges. While it is undoubtedly useful to have a list of tools commonly used by ransomware gangs to hunt, detect, and block, there are some risks.
> - Many of the tools referenced in this repository may be currently used by your IT team or even your Cybersecurity team.
> - When hunting for these tools, you may uncover many installations of them inside your environment.
> - Deciphering whether a tool is being used legitimately, by an employee, with permission is difficult in a large or global environment.
> - If you create a detection rule, you may generate a large amount of alerts, which may get ignore or turned off without investigating them.
> - If you block these tools without investigating for legitimate usage, you may cause disruption to legitimate business operations and potentially impose costs on your own organisation.#### How To Contribute
- Please see the following [guidelines](https://github.com/BushidoUK/Ransomware-Tool-Matrix/blob/main/HowToContribute.md) to contribute to this repo.#### Integrations
- [Ransomware.live](https://x.com/JMousqueton/status/1824434279251665259)
- [eCrime.ch](https://x.com/ecrime_ch/status/1824469830613021070)